Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Permanent URI for this collectionhttps://hdl.handle.net/11147/7148
Browse
77 results
Search Results
Article Citation - WoS: 15Search for Supersymmetry in pp Collisions at √s=7 TeV in Events With a Single Lepton, Jets, and Missing Transverse Momentum(Springer, 2013) Chatrchyan, S.; Khachatryan, V.; Sirunyan, A. M.; Tumasyan, A.; Adam, W.; Aguilo, E.; Swanson, J.Results are reported from a search for new physics processes in events containing a single isolated high-transverse-momentum lepton (electron or muon), energetic jets, and large missing transverse momentum. The analysis is based on a 4.98 fb(-1) sample of proton-proton collisions at a center-of-mass energy of 7 TeV, obtained with the CMS detector at the LHC. Three separate background estimation methods, each relying primarily on control samples in the data, are applied to a range of signal regions, providing complementary approaches for estimating the background yields. The observed yields are consistent with the predicted standard model backgrounds. The results are interpreted in terms of limits on the parameter space for the constrained minimal supersymmetric extension of the standard model, as well as on cross sections for simplified models, which provide a generic description of the production and decay of new particles in specific, topology based final states.Editorial Preface(Springer, 2019) Daim,T.; Dabić,M.; Başoğlu,N.; Lavoie,J.R.; Galli,B.J.[No abstract available]Book Part Adoption Factors of Electronic Health Record Systems(Springer, 2016) Kök,O.M.; Başoğlu, Ahmet Nuri; Daim,T.U.Today’s rapidly changing regulations, increasing healthcare costs, and most importantly globalization have made health record keeping an important issue. Electronic health record systems are rising as a crucial and unavoidable way of record keeping for healthcare. However, as other information technology implementations, electronic health records also have their own adoption processes and diffusion factors. The main goal of this study is to define a model to analyze the adoption process of electronic health record systems and to understand the diffusion factors. © 2016, Springer International Publishing Switzerland.Article Citation - Scopus: 1Assessment and Transport of Sediment-Bound Estuarine Contaminants(Springer, 2015) Work, P. A.; Haas, K. A.; Warren, D. A.; Elçi, ŞebnemEstuaries and coastal bays frequently receive anthropogenically sourced contaminants. Many of these contaminants (e.g. most metals) have low solubility and tend to sorb to sediment particles, so that sediment transport driven by fluid mechanics becomes an important part of the contaminant transport problem. The chosen strategy for mitigation of the contaminant(s) will depend on the potential for migration away from the affected region, or the build-up of concentrations within the receiving area if loading rate exceeds decay or transport rates, and the potential impact on environmental and human health both within and outside the receiving area. Two case studies are considered here in which data describing instantaneous contaminant concentrations in estuarine environments were acquired via field sampling. Both sites feature estuaries dominated by tidal forcing, with smaller, adjacent upland regions also impacted. Metals, particularly copper and lead, are the primary focus in each case. Contaminant transport processes, including diffusion, advection, and bioturbation, are treated together to develop analytical and numerical solutions for time-dependent contaminant concentrations using a spatially varying, time-dependent, effective diffusion coefficient that is influenced by local surface water flow speeds. Different initial, boundary, and loading conditions are considered to illustrate the relative importance of the various transport processes. Implications of future contaminant loading and sea level rise scenarios are demonstrated and discussed.Book Citation - Scopus: 6Climate Change and Its Effects on Water Resources: Issues of National and Global Security(Springer, 2011) Baba, Alper; Gündüz, Orhan; Friedel, Michael J.; Tayfur, Gökmen; Howard, Ken W.F.; Chambel, AntonioNational and global security can be assessed in many ways but one underlying factor for all humanity is to access to reliable sources of water for drinking, sanitation, food production and manufacturing industry. In many parts of the world, population growth and an escalating demand for water already threaten the sustainable management of available water supplies. Global warming, climate change and sea level rise are expected to intensify the resource sustainability issue in many water-stressed regions of the world by reducing the annual supply of renewable fresh water and promoting the intrusion of saline water into aquifers along sea coasts where 50% of the global population reside. Pro-active resource management decisions are required, but such efforts would be futile unless reliable predictions can be made to assess the impact of the changing global conditions that would impart upon the water cycle and the quality and availability of critical water reserves.Conference Object Citation - Scopus: 1Distributed Identity Based Private Key Generation for Scada Systems(Springer, 2013) Kılınç, Görkem; Nai Fovino, IgorThe security of the ICT (Information Communications Technology) components of industrial systems is gaining great importance in the context of their criticality for society at large. There is an urgent need for the consideration of security in their design, and for the analysis of the related vulnerabilities and potential threats. The high exposure of industrial critical infrastructure to such threats is mainly due to the intrinsic weakness of the communication protocols used to control the process network. The peculiarities of the industrial protocols (low computational power, large geographical distribution, near to real-time constraints) make hard the effective use of traditional cryptographic schemes and in particular the implementation of a effective key management infrastructure supporting a cryptographic layer. In this paper we present the first working prototype of a distributed key generation infrastructure for SCADA systems based on the well known identity based crypto-paradigm. © 2013 Springer-Verlag.Conference Object Citation - Scopus: 3Integrated Approach for Privacy Preserving Itemset Mining(Springer, 2012) Yıldız, Barış; Ergenç, BelginIn this work, we propose an integrated itemset hiding algorithm that eliminates the need of pre-mining and post-mining and uses a simple heuristic in selecting the itemset and the item in itemset for distortion. Base algorithm (matrix-apriori) works without candidate generation so efficiency is increased. Performance evaluation demonstrates (1) the side effect (lost itemsets) and time while increasing the number of sensitive itemsets and support of itemset and (2) speed up by integrating the post mining. © 2012 Springer Science+Business Media, LLC.Conference Object On-board applications development via symbolic user interfaces(Springer, 2014) Kumova, Bora İsmailbecerik is a functional language consisting of symbolic commands for managing and composing applications. Application commands consist of symbols that are associated with reading sensor values, computing those values and executing actuator values. It is the result of a co-design of mechatronic functionality and robotic behaviour. The requirements given for mechatronic functionality were those of simple robotics kits that are used in school education or as toys. The requirements given for the behaviour were to provide a reflexive one, consisting of triggering simple computations and actuations from simple sensor values. becerik currently lives as a leJOS application on NXT robots and enables developing simple applications using the standard display and buttons of the NXT brick. In this paper we introduce the symbolic user interfaces of becerik. © 2014 Springer International Publishing Switzerland.Conference Object A Roadmap for Semantifying Recommender Systems Using Preference Management(Springer, 2010) Tapucu, Dilek; Tekbacak, Fatih; Ünalır, Murat Osman; Kasap, SedaThe work developed in this paper presents an innovative solution in the field of recommender systems. Our aim is to create integration architecture for improving recommendation effectiveness that obtains user preferences found implicitly in domain knowledge. This approach is divided into four steps. The first step is based on semantifying domain knowledge. In this step, domain ontology will be analyzed. The second step is to define an innovative hybrid recommendation algorithm based upon collaborative filtering and content filtering. The third step is based on preference modeling approach. And in the fourth step preference model and recommendation algorithm will be integrated. Finally, this work will be realized on Netflix movie data source. © 2011 Springer Science+Business Media B.V.Book Part Suspended Sediment Concentration in Stratified Lakes Estimated by Acoustic Methods(Springer, 2012) Elçi, Şebnem[No abstract available]
